MohammedRashad / Simplex
Programming Language for everyone, and no one.
☆18Updated 7 years ago
Alternatives and similar repositories for Simplex:
Users that are interested in Simplex are comparing it to the libraries listed below
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- This tool help you to decryption of AES Encrypted file in very easy way.☆8Updated 2 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- ARPER is an arp cache poisoning tool, it sends spoofed address resolution protocol messages onto a local area network. It has the abilit…☆8Updated 11 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- XSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/☆33Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆186Updated 6 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆18Updated 7 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 7 months ago
- ~ BannerGrab☆26Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Hacking challenges☆32Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆120Updated last year
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- free exploit framework written use python language version 3.3☆31Updated 7 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Python Powered Repository☆16Updated 5 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago